Friday, October 28, 2011

Dir command


Dir command

Used to display the contents of a directory to the screen.
Way of writing:
dir [drive:] [path] [file what will be in-listings] [/ p] [/ w] [/ a]
[Drive:]: Displays a list (listing) the contents of files in the drive.
[Path]: Displays a list (listing) the contents of files in the path.
[File what will be dilisting]:
Determination of what files are in-listing can use wildcard characters (? & *).
: Any one character
*: All characters
Example:
? Oba.txt: All files beginning with any letter, provided followed oba.txt
try .*: All files with the extension named try anything.
[/ P] [/ w]: Appearances dilisting file on the screen.
[/ P]: displayed per page (per screen),
[/ W]: displayed sideways, direct the entire file.
[/ A]: All files, including files with hidden attributes, is shown.
Steps of use:
1. Type the command dir to be used in the command prompt.
2. Press enter.

Setting the file name in DOS.

DOS is a display graphics, single-user operating system and it's a process.
DOS, the default operating system boot process is complete, and if you are using DOS commands after the user is ready to receive, it might seem, C: \> Command line was. Users of DOS command prompt and press Enter at the rear to create and you can instruct it to something.
Windows95 operating system your computer has the Windows version, if more, the following DOS command line can be obtained by using the words:
 
- First method:
O in Windows 98
  •  The MS - DOS to run.
  •  You can also enter a command on the Start button, select Run  
 
- The second way:
About Windows XP or 2000 Professional
The Click
A   All Programs Accessories Command Prompt to choose
O or the Start button, select Run, type cmd  

 DOS file name
Two parts, namely the configuration file name
  •  Name up to 8 characters (alphanumeric, 0-9 and special characters such as: ~, @, #, $,%, ^, &, (,), {,}, -, _,',').
It starts with the alphabet.
It can not be separated by a space.
are characteristically large and small letters (uppercase and lowercase letters are considered equivalent.)
  • File Extension
characteristically choice (optional).
 up to three characters.
 In general, the types of files you want to view and use exactly three jaeul. Some competition and expansion of this type of file, forty to two padanana:
  •  night backup file.
  •  bat is a batch file.
  •  Program COM system.
  •  exe is an executable program.
  •  DAT data files.
  •  DOC document file (MS Word).
  •  text TXT file.

Computer data security with fingerprint sensor

Only by using a password is not enough. Today, many companies - vendors for notebook computers with integrated fingerprint sensor products to improve the security of their laptops. Laptop or notebook fingerprint biometric fingerprint reader, fingerprint, depending on the approval to limit access to certain computer devices. Sensor or fingerprint fingerprint scanner is the best option to improve the security.
You use this code as a special code or password to encrypt the fingerprint texture, fingerprint reader (fingerprint sensor / reader) feature. While accessing the sensor of laptop users and each user's finger or meletakkkan mengosokkan / shift and one (or more) can be selected. In addition, the sensor is a legal or illegal use of a fingerprint reader to detect the finger. Legal users encrypt the fingerprint verification / permission if you are using a laptop, users can access it by completely.
Many notebooks today, the fingerprint sensor and the latest technology. Most of the scanner's built-in touch pad computers typically have found a fingerprint sensor. And about the benefits of one kind of laptop fingerprint sensor has been built. Reader and a fingerprint sensor, the option can not be left, pushed on a laptop, do not worry.
You have not experienced the notebook's fingerprint safe you will not be disappointed if you are using. Fingerspot brand biometric technology products for the professional solution to provide a solution. This product exsternal fingerprint sensor and requires no application changes based on a user name and password for the software application can be supported. For more information on the topic of data security solutions, see
For all platforms, but we can lock the computer by using a fingerprint scanner that supports this type of encryption is would. Your fingerprint sensor, if you want to use, that meet these requirements if the series in this system because it is not, at least Windows XP or on a computer than installing, operating system, your operating system, it crash the system introduced that Check
Indonesia to get its own is very simple. Notebook in the company's third-party products is a great series. To hargapun over the past few years has begun to fall from 12 to 5,000,000

Creator of the world's first WORM


It was still early when itu.Di a computer lab Massachusetts Institute of

Techonlogy (MIT), on Tuesday, November 2, 1988, Robert Tappan Morris mengutak0atik bikinannya.Kono another computer program, the program is based desertasinya.Morris time logged in as a graduate student at Cornell University.Sebetulnya mahasisiwa, there was disagreement is made using the computer program Morris.tapi all agreed to call the program komputer.Worm as a kind of worm or worm, thought the particular language we Indonesia.Dari this computer program, indexing and distribution of the ubiquitous propagate from one computer to another computer.
Unlike computer viruses, worms are not necessary, targeted to a floppy or USB flash drive to PC ditunggangkan diri.Worm over the existing road, the compound itself to communicate with other computers such as Internet Connection or a local distributed computing network.
Morris worm was programmed to spread through a vulnerability in the computer operating system UNIX.Salah a vulnerability exploited by the Morris is a vulnerability in sendmail program, which is often used by Internet servers used to weaknesses in email.Lewat Send e-mail program, send a remote command that Morris was a dialogue program that effectively run the worm further recommended that the machine is opened. To intrude into other computer systems are programmed artificial Morris worm, a list of users available on a computer on the network, and then chased passwordnya.Pertama rely on the laziness of the user, the worm search

History of the computer was first discovered

First inventor Charles Babbage was an expert in mathematics in 1822, but further development can not be separated from the service of the inventors of the next generation.

Who are the inventors of them is the following
Charles Babbage in 1822, with an ingenious idea mendciptakan a tool to support people in carrying out complex calculations. The engine is not completed at this time in London, the Museum of Science. From the computer on which the embryo begins.
In 1937, Dr. John V. Atanasoff and Clifford Berry designed the first electronic digital computer. Called ABC (Atanasoff-Berry Computer). ABC can easily add and charge less.
In 1943, during the Second World War, a British scientist Alan Turing designed specifically called for British troops electronic calculators. Code is used to penetrate the German defenses.
Howard Hathaway Aiken, in 1944 (U.S.) that the mark I. A team that created the first digital account. It has an area of ​​7.45 meters x 50 meters with a weight of 35 tons. Mark I was used to calculate probabilities.
In 1945, Dr. John von Neumann wrote the concept of data storage. I was still in the form of ideas.In 1946 Dr. John W. Mauchly and J. Presper Eckert, Jr.. closed the first large computer called ENIAC (Electronic Numerical Integrator and Computer). The world knows these two men in order of detection.ENIAC weighed 30 tons, consisting of 18,000 tube lights (transistor size), has an area of ​​30 meters x 50 meters, with 160,000 watts of power. The first time you turn on the computer, turned the entire stream network of the sudden death of Philadelphia.ENIAC could calculate not only less time for more, but can also be programmed to perform a simple procedure. Compared to the Mark I, which can only be calculated, it is clear that the ENIAC was the first computer in the world.
In 1947, the first transistor was invented by William Shockley, John Bardeen and Walter Brattain. Since the transistor is the size of computers has reduced ..

Octane OCZ SSD 2.5-inch reach 1 TB capacity with SATA-III


OCZ is now the first company with a capacity of 1 TB SSD market at a price of $ 1,300 or about 11.5 million dollars.Octane OCZ SSD SATA - 128 GB capacity on a large 2.5-inch drive with an interface III 6Gbps, 256GB, 512GB and is available in capacities up to 1TB and selection. OCZ, the octane series, which provide funds for general use, such as the transfer of files for compression of different sizes and all these drives "a diverse workload," in custom, entitled to a new level of performance.

This new level of performance, or use Everest Indilinx controller can read speeds of 560 megabytes / sec read and write speed / drive 400 megabytes were achieved thanks to achieve. Random 4K read IOPS and be evaluated by the value of 45,000, and the latency of 0.06ms 0.09ms and stuck to their writing and reading.The drive comes with a DRAM cache of 512 MB.

A lot of money to invest in SSD should be compared to the hard drive would be a difficult decision for a limited service life. OCZ is NDurance by proprietary technology to mitigate these concerns to some degree. NDurance is expected to increase the cycle of program / erase and add maybe 5000-10000 times the durability of the storage technology and NAND.
If you do not have to spend a budget of $ 1,300, if the 1TB model has a capacity of 128 gigabytes, have starting at $ 166, about $ 310 256, but pricing still no final confirmation, you can choose.
Slower OCZ offers the same storage, SATA - II 3Gbps ynag dependence, octane - announced the S2 series. Speed ​​at rated load 30 000 IOPS 4K drives the second 265 Megabyte / S2 and 275 megabytes / s. Write to G.. Price information is not given, but it certainly is SATA - cheaper than octane Naruarimasen III.